Why are prime numbers important? Are there any practical uses of prime numbers or are they taught in school life just for covering academic syllabus! Get familiar with some practical uses of prime numbers in this short animated video.
Do share with us if you know any more real life uses of prime numbers. And what do you think about periodical cicadas, using prime numbers for their existence. Isn't it just amazing. Keep watching for more such curious Tell me why shorts every Monday @ 5PM (IST)
Till then Like and share our videos. Don't forget sharing is caring. Thanks for watching.
Follow us, Like us, be a part of the family:
►http://facebook.com/tellmewhyvideos
►https://twitter.com/tellmewhyvideos
Sources and further readings:
http://www.baltimoresun.com/bal-te.ms.cicada10may10-story.html
http://math.stackexchange.com/questions/43119/real-world-applications-of-prime-numbers
To more about RSA encryption visit the wikipedia page:
https://en.wikipedia.org/wiki/RSA_(cryptosystem)
Bckground Music:
Kevin Macleod
incompetech.com

Numbers and Mathematics are as old as human life. Zero was found by Indians who were and are eminent mathematicians. Numbers play a vital role in our everyday life. LOOK!!! Palaniswamy R, has diverse interest in education. With over four decades of experience teaching mathematics and statistics, he has PhDs in Acceptance Sampling and Human Resources. His passion for fitness and numbers is paralleled only by his interest in rhythm and mridangam. This talk was given at a TEDx event using the TED conference format but independently organized by a local community. Learn more at https://www.ted.com/tedx

Join Facebook Group: https://www.facebook.com/groups/majorprep/
Follow MajorPrep on Twitter: https://twitter.com/MajorPrep1
This video covers how imaginary numbers are used to solve real worlds problems in math, science, and engineering as well as a derivation of the most beautiful equation in math. The main topics include signals, controls, quantum mechanics, electromagnetism, and circuits but imaginary numbers do have more applications.
#complexNumbers
#mostbeautifulequation
►My Setup:
Space Pictures: https://amzn.to/2CC4Kqj
Camera: https://amzn.to/2RivYu5
Mic: https://amzn.to/2BLBkEj
Tripod: https://amzn.to/2RgMTNL
Equilibrium Tube: https://amzn.to/2SowDrh
►Support the Channel
Patreon: https://patreon.com/majorprep
PayPal(one time donation): https://www.paypal.me/majorprep
►Check out the MajorPrep Amazon Store: https://www.amazon.com/shop/majorprep
***************************************************
► For more information on math, science, and engineering majors, check us out at https://majorprep.com
Best Ways to Contact Me: Facebook, twitter, or email ([email protected])

One of the hottest topics in current crypto research is Post-Quantum Cryptography. This branch of cryptography addresses asymmetric crypto systems that are not prone to quantum computers.
Virtually all asymmetric crypto systems currently in use (Diffie-Hellman, RSA, DSA, and Elliptic Curve Crypto Systems) are not Post-Quantum. They will be useless, once advanced quantum computers will be available. Quantum computer technology has made considerable progress in recent years, with major organisations, like Google, NSA, and NASA, investing in it.
Post-Quantum Cryptography uses advanced mathematical concepts. Even if one knows the basics of current asymmetric cryptography (integer factorisation, discrete logarithms, …), Post-Quantum algorithms are hard to understand.
The goal of this presentation is to explain Post-Quantum Cryptography in a way that is comprehensible for non-mathematicians. Five families of crypto systems (as good as all known Post-Quantum algorithms belong to these) will be introduced:
Lattice-based systems:
The concept of lattice-based asymmetric encryption will be explained with a two-dimensional grid (real-world implementations use 250 dimensions and more). Some lattice-based ciphers (e.g., New Hope) make use of the Learning with Error (LWE) concept. I will demonstrate LWE encryption in a way that is understandable to somebody who knows Gaussian elimination (this is taught at middle school). Other lattice-based systems (especially NTRU) use truncated polynomials, which I will also explain in a simple way.
Code-based systems:
McEliece and a few other asymmetric ciphers are based on error correction codes. While teaching the whole McEliece algorithm might be too complex for a 44CON presentation, it is certainly possible to explain error correction codes and the main McEliece fundamentals.
Non-commutative systems:
There are nice ways to explain non-commutative groups and the crypto systems based on these, using everyday-life examples. Especially, twisting a Rubik’s Cube and plaiting a braid are easy-to-understand group operations a crypto system can be built on.
Multivariate systems:
Multivariate crypto can be explained to somebody who knows Gaussian elimination.
Hash-based signatures: If properly explained, Hash-based signatures are easier to understand than any other asymmetric crypto scheme.
I will explain these systems with cartoons, drawings, photographs, a Rubik’s Cube and other items.
In addition, I will give a short introduction to quantum computers and the current Post-Quantum Crypto Competition (organised by US authority NIST).
For more from 44CON and tickets visit 44CON Website: https://44con.com
---=== Contact ===---
YouTube: https://youtube.com/c/44contv
Website: https://44con.com
Twitter: https://twitter.com/44con
LinkedIn: https://www.linkedin.com/groups/44Con-3886577
Facebook: https://www.facebook.com/44CON
---=== Music Credits ===---
Island - by MBB: https://soundcloud.com/mbbofficial (https://twitter.com/mbbmusic)
Grind - by Andrew Huang - YouTube Music Library

Check out the Most DIFFICULT Codes That Were Ever CRACKED! From breaking famous uncracked codes to some of the most mysterious ciphers finally solved using computer science, this top 10 list of incredible codes & ciphers that were finally figured out will amaze you!
Follow us on instagram! https://www.instagram.com/katrinaexplained/
Subscribe For New Videos! http://goo.gl/UIzLeB
Watch our "REAL Mermaid Sightings Around The World!" video here: https://youtu.be/ChM0CBRmVsM
Watch our "Most Amazing Cities Found UNDERWATER!" video here: https://www.youtube.com/watch?v=rUqxhYJqGhU
Watch our "Most EXPENSIVE Private Jets Owned By BILLIONAIRES!" video here: https://www.youtube.com/watch?v=nyqlXe3-jrA
10. The Zimmerman Telegram
During times of war, messages are often sent in code to prevent the enemy from finding out about secret plans. Spies are everywhere, and if the message is ever decoded by an unintended recipient, it can change the course of history… and that’s exactly what happened in 1917.
9. The Battle of Midway
The Battle of Midway, which took place between the 4th and 7th of June, 1942, was one of the American military’s biggest victories over the Japanese navy during the second world war. In this battle over 3,000 Japanese sailors lost their lives and 4 aircraft carriers were destroyed, while the Americans lost 300 sailors and one carrier. It could have all been different, though, had US cryptographers not intercepted and decoded Japanese transmissions.
8. The Babington Plot
The Babington plot was an attempt, in 1586, to assassinate Queen Elizabeth the First, protestant daughter of King Henry VIII. The goal was to replace her on the throne with Mary Queen of Scots, who was her Roman Catholic cousin. On July 6th that year, Anthony Babington, encouraged by support from abroad (mostly Spain) wrote a long letter to Mary, who at the time was already in prison.
7. Olivier Levasseur
According to legend, the notorious French Pirate, Olivier Levasseur, managed to acquire a huge fortune during his piracy across the Caribbean and West Africa- most notably in 1721 when he and his crew captured a Portuguese treasure ship that had become grounded on a sandbar during a storm- an act that is said to be one of the greatest paydays in the history of piracy.
6. Poe’s Challenge
Edgar Allan Poe was a renowned writer and poet, known for his stories of mystery… but he was also fascinated with ciphers and codes. He even wrote a story, The Gold Bug, about the solution to one. In 1840, he wrote an article for Graham's magazine called ‘A Few Words on Secret Writing' in which he invited readers to send him coded messages for him to decipher.
5. Linear B
In 1900, among the ruins of a Bronze age palace in Knossos, Greece, archaeologists found a script that resembled nothing that had ever been seen before. Containing images of swords, chariots, and countless other small pictograms, this system of writing became known as Linear B and would prove to be a mystery for the following 50 years.
4. Frank Sidebottom
Frank Sidebottom was the papier-mâché headed comedy persona of English musician Chris Sievey. Throughout his career in the 80s and 90s, he fronted tv and radio shows and even reported for the local news. He created numerous newsletters and writings over this time, too, and these were often accompanied by symbols around them… ones that people long suspected had a meaning, but they couldn't work out what it was.
3. Chaocipher
The Chaocipher was created by John Francis Byrne in 1918 and was what he described as being unbreakable… yet simple. So simple, in fact, that it only required two rotating discs that were small enough to fit into a cigar box and could be operated by a ten-year-old. He offered a cash reward to anyone who could crack it, but this is something that would never be claimed.
2. The Copiale Cipher
Created in the 1730s, the Copiale cipher is a 105-page manuscript that has baffled researchers ever since…That is until 2011 when it was finally decoded. Consisting of 75,000 handwritten characters; including arrows, shapes, runes, math symbols, roman letters, and Greek letters… there were only two examples of plain text in the entire book.
1. The Enigma Code
The Enigma was an enciphering machine used by the German armed forces during the second world war to send secure messages. Early on, Polish mathematicians had figured out how to read these messages, but once the Germans realized this, they began to change the cipher system daily, making it virtually impossible to decipher.
Origins Explained is the place to be to find all the answers to your questions, from mysterious events and unsolved mysteries to everything there is to know about the world and its amazing animals!

Strip away the trimmings of a traditional science presentation, add cocktails, and you have WSF Spotlight. How much of your information would you rather stay hidden from public view? Using a hypothetical scenario, and with the help of her two daughters, Tal Rabin describes a world without cryptography, where our online interactions are available to anybody with the desire to look.
Original Program Date: June 2, 2011
The World Science Festival gathers great minds in science and the arts to produce live and digital content that allows a broad general audience to engage with scientific discoveries. Our mission is to cultivate a general public informed by science, inspired by its wonder, convinced of its value, and prepared to engage with its implications for the future.
Subscribe to our YouTube Channel for all the latest from WSF.
Visit our Website: http://www.worldsciencefestival.com/
Like us on Facebook: https://www.facebook.com/worldsciencefestival
Follow us on twitter: https://twitter.com/WorldSciFest

Today we’re going to talk about how to keep information secret, and this isn’t a new goal. From as early as Julius Caesar’s Caesar cipher to Mary, Queen of Scots, encrypted messages to kill Queen Elizabeth in 1587, theres has long been a need to encrypt and decrypt private correspondence. This proved especially critical during World War II as Allan Turing and his team at Bletchley Park attempted to decrypt messages from Nazi Enigma machines, and this need has only grown as more and more information sensitive tasks are completed on our computers. So today, we’re going to walk you through some common encryption techniques such as the Advanced Encryption Standard (AES), Diffie-Hellman Key Exchange, and RSA which are employed to keep your information safe, private, and secure.
Note: In October of 2017, researchers released a viable hack against WPA2, known as KRACK Attack, which uses AES to ensure secure communication between computers and network routers. The problem isn't with AES, which is provably secure, but with the communication protocol between router and computer. In order to set up secure communication, the computer and router have to agree through what's called a "handshake". If this handshake is interrupted in just the right way, an attacker can cause the handshake to fault to an insecure state and reveal critical information which makes the connection insecure. As is often the case with these situations, the problem is with an implementation, not the secure algorithm itself. Our friends over at Computerphile have a great video on the topic: https://www.youtube.com/watch?v=mYtvjijATa4
Produced in collaboration with PBS Digital Studios: http://youtube.com/pbsdigitalstudios
Want to know more about Carrie Anne?
https://about.me/carrieannephilbin
The Latest from PBS Digital Studios: https://www.youtube.com/playlist?list=PL1mtdjDVOoOqJzeaJAV15Tq0tZ1vKj7ZV
Want to find Crash Course elsewhere on the internet?
Facebook - https://www.facebook.com/YouTubeCrash...
Twitter - http://www.twitter.com/TheCrashCourse
Tumblr - http://thecrashcourse.tumblr.com
Support Crash Course on Patreon: http://patreon.com/crashcourse
CC Kids: http://www.youtube.com/crashcoursekids

This clip from the 2008 Royal Institution Christmas Lectures shows a simple demonstration of how two people can agree on a secret key, even though all of their communications are carried out in public. In the electronic world, secret key exchange allows computers to communicate securely, and is used, for example, when you give your credit card information to an on-line shop.
You can watch the 2008 Royal Institution Christmas Lectures in full at: http://research.microsoft.com/~cmbishop or by visiting the Royal Institution web site.
There is a dedicated web site to accompany the 2008 Christmas Lectures, with ten interactive games as well as downloadable PDF instructions for experiments which can be conducted at home or at school: http://www.rigb.org/christmaslectures08

This video discusses about the four types of conic sections and its applications in real life. Created using Premiere Pro CC 2015 & PowerPoint 2016.
Don't forget to like and subscribe! Thanks for watching.
Music used: https://www.youtube.com/watch?v=y36oebRx4rc
Follow me on Twitter: http://twitter.com/laustinrivar
Follow me on Instagram: http://instagram.com/laustinrivar
Follow me on Tumblr: http://laustinrivar.tumblr.com

In this episode of SciShow, we’re going to investigate a murder. But first, we’re going to have to learn all about forensics, the use of science in criminal law -- and the real-life version is a little different from what you might see on TV.
Hosted by: Michael Aranda
----------
Dooblydoo thanks go to the following Patreon supporters -- we couldn't make SciShow without them! Shout out to Justin Ove, Justin Lentz, David Campos, Chris Peters, and Fatima Iqbal.
----------
Like SciShow? Want to help support us, and also get things to put on your walls, cover your torso and hold your liquids? Check out our awesome products over at DFTBA Records: http://dftba.com/scishow
Or help support us by becoming our patron on Patreon:
https://www.patreon.com/scishow
----------
Looking for SciShow elsewhere on the internet?
Facebook: http://www.facebook.com/scishow
Twitter: http://www.twitter.com/scishow
Tumblr: http://scishow.tumblr.com
Instagram: http://instagram.com/thescishow
Sources:
https://www.eff.org/deeplinks/2014/04/fbi-plans-have-52-million-photos-its-ngi-face-recognition-database-next-year
http://www.alternet.org/story/153664/5_things_you_should_know_about_the_fbi's_massive_new_biometric_database
http://www.nytimes.com/2015/08/13/us/facial-recognition-software-moves-from-overseas-wars-to-local-police.html
http://www.nytimes.com/2015/08/15/opinion/how-the-fbi-uses-facial-recognition-analysis.html?_r=2
http://www.theverge.com/2014/8/8/5982727/face-wreck-how-advanced-tech-comes-up-short-for-police
http://science.howstuffworks.com/life/genetic/dna-evidence.htm
http://www.scientific.org/tutorials/articles/riley/riley.html
http://www.bbc.co.uk/science/0/20205874
http://www.mlo-online.com/articles/201404/str-typing-method-and-applications.php
http://www.cstl.nist.gov/strbase/pub_pres/Butler_BiotechniquesSuppl_Oct2007.pdf
http://electronics.howstuffworks.com/gadgets/high-tech-gadgets/facial-recognition1.htm
http://www.mitchpileggi.net/Deep_Background/resources/forensics/bodies.htm
https://books.google.com/books?id=adKcM055ERoC&pg=PT265
http://serendip.brynmawr.edu/biology/b103/f02/web2/wcarroll.html
http://www.howtogeek.com/howto/43078/stop-believing-tvs-lies-the-real-truth-about-enhancing-images/
http://nzic.org.nz/ChemProcesses/biotech/12A.pdf

Beware my brothers and sisters, man try daily to master the text without the Set-Apart Spirit the Almighty Father Yahuah sent in Yahusha's name (referencing John 14:26); without life, trying to use scripture for personal gain will come to naught. Let us promote the ability to grow in a relationship with He who brings the letter to life; Yahusha is His name sent by the Almighty Father Yahuah.
If you would like a copy of the outlined text for this segment, please contact me and I will get it to you. The description is limited and therefore, I have taken a different approach; thanks for your patience. Shalum.

Get my FREE case study on how I PASSIVELY earned $2,008.73 in 40 days with crypto here:
https://cryptoauthorityblog.com/
Get my pro course on how to earn PASSIVE INCOME with cryptocurrencies here:
https://cryptoauthorityblog.com/crypto-passive-income
Get yourself some awesome crypto merch & apparel here:
https://cryptoauthorityblog.com/merch
In this video, I wanted to talk about some real world use cases for cryptocurrencies that actually exist today!
Donate:
BTC:
38j4WNy5vQX5tBoivRqS3p2t3Gi3XaZVN1
ETH:
0x5D9e249bb016EA71c1302597f6b62eEF3ed9440a
BCH:
qqd47txpl0dwf6g9el7g42gepkjsnt40dg8e8jy43k
LTC:
MJFyxM7NwjCvzN1QDDS58dBTEYdFjLv9bW
Donations are very much appreciated but please don’t feel obligated to donate!
You Might Also Like Some Of These Resources Below:
Buy Bitcoin, Ethereum and Litecoin on Coinbase and get $10 worth of cryptocurrency for free:
https://www.coinbase.com/join/5994cefa21d34c01bf803493
Buy and trade altcoins on Binance:
https://www.binance.com/?ref=16912789
Get a free trial of Coinigy (trading/charting software I use):
https://www.coinigy.com/?r=ab80797f
Keep your crypto safe with a Ledger Nano S:
https://www.ledgerwallet.com/r/416b
Follow us on Steemit:
https://steemit.com/@cryptoauthority
Join the free Facebook group:
https://www.facebook.com/groups/384030118766785/
Follow us on Twitter:
https://twitter.com/CryptoAuthBlog
Follow us on Pinterest:
https://www.pinterest.com/cryptoauthority/
*Some of the links above may be affiliate links. That means if you click and purchase something, I could receive a small commission at no additional cost to you. I only recommend companies and products that I actually use. Any and all commissions help to pay for content creation. Thanks! *
** This is not financial advice and these are simply my own opinions. This should not be treated as explicit financial, trading or investment advice. Do you own research before investing or spending any money. **

Sign up to Skillshare with this link to get 2 months free!
http://skl.sh/upandatom
Head over to Thomas Frank's channel to learn how to do life better
https://www.youtube.com/user/electrickeye91
Hi! I'm Jade. Subscribe to Up and Atom for new physics, math and computer science videos every second week!
*SUBSCRIBE TO UP AND ATOM* https://www.youtube.com/c/upandatom
*Follow me: @upndatom
INSTAGRAM: https://www.instagram.com/upndatom/
TWITTER: https://twitter.com/upndatom?lang=en
A big thank you to my AMAZING PATRONS!
Alan McNea, Anne Tan, Simon Mackenzie, Daniel Tan-Holmes, Andrew Pann, Dave, Yoseph, Susan Jones, Simon Dargaville, Dean Madden, Noah McCann, Robert Frieske, Magesh, Dave Mayer, Renato Pereira, Stephen Veitch, Todd Loreman, David, Carston Berggreen.
If you'd like to consider supporting Up and Atom, head over to my Patreon page :)
https://www.patreon.com/upandatom
For a one time donation, head over to my PayPal :) https://www.paypal.me/upandatom
Other videos you might like:
What is a Singularity, Exactly? https://youtu.be/NLQNBfI97Ck
When to Think Less (According to Math) https://youtu.be/sivWzd_AecU
When to Quit (According to Math) https://youtu.be/tVRGadNoHC0
*Sources*
The Art of Strategy: A Game Theorist's Guide to Success in Business and Life - Avinash K. Dixit and Barry J. Nalebuff
https://www.amazon.com/Art-Strategy-Theorists-Success-Business/dp/0393337170

Security is hard, yet vital for any software these days. After all you don't want to become the laughing stock on hacker news or cause your company to loose billions in shareholder value. This talk won't turn you into a security specialist over night, but you will learn how to avoid common mistakes in your daily work as developer or administrator. I'm going to take you on a brief tour in secure software design, illustrate various attack vectors, and point you to helpful tools and resources. Topics include threat analysis, deployment, parsing, authentication, TLS/SSL, crypto, and user interaction, with some real life examples from my daily work. 30 minutes version from PyCon UK: https://speakerdeck.com/tiran/pycon-uk-2017-everyday-security-issues-and-how-to-avoid-them

Dr. Orr Dunkelman of Haifa University
Lecture at TCE Summer School 2013, July 25, 2013
When Cryptography is not the Answer (even when it is)
Since modern cryptography has emerged in the mid 70's, it developed a huge set of solutions to many of the security problems: from secure algorithms for communication, to identification of entities, from integrity assurance for programs, to methods for evaluating a function without revealing it.
Despite these advances, even the security challenges that were solved by cryptography are still affecting our everyday life: from using old and insecure algorithms, through key management issues, to problems in the interaction between the cryptography and the system where it resides.
In this talk we shall consider several examples of such issues, of the gaps between "what is already solved by cryptographers" and "what the security professionals see as unsolved (if not unsolvable)". We will try to isolate the sources for such problems, and look for the changes, both in the technical level and in the perception level, needed from both sides of the security equation (cryptographers and security professionals), to overcome these issues in the future.

Real life isn't as simple as true or false - Fuzzy logic allows you to have degrees of truth, meaning computer programmes can deal with more diverse situations.
Home Made Z80 Retro Computer: http://youtu.be/OtpaY8VD52g
Kernel Panic: Coming Soon!
http://www.facebook.com/computerphile
https://twitter.com/computer_phile
This video was filmed and edited by Sean Riley.
Computer Science at the University of Nottingham: http://bit.ly/nottscomputer
Computerphile is a sister project to Brady Haran's Numberphile. See the full list of Brady's video projects at: http://bit.ly/bradychannels

Want to learn more about Cryptocurrency and the Cryptographic Protocols? Watch the video below to see how simple & effective, Bitcoin trading can really be https://goo.gl/q8kdDV
....
A protocol is a set of rules. It describes the proper protocol for certain actions and behaviors.
David Johnston, the Governor General of Canada, broke protocol when he touched Queen Elizabeth II on the steps of Canada House on Trafalgar Square in London.
The Queen was 91 years old at the time and the Governor General touched her arm to protect her from falling on the steps. It is protocol to not touch a member of Britain’s royal family.
methods. Specific topics include: 1. Overview of communications channels used in power systems. 2. Review of cryptographic protocols and how they work. 3. How cryptography can impact monitoring, control, and protection communications. 4. Differences between substation communications systems and corporate
The confidentiality and integrity protections offered by cryptographic protocols such as SSL/TLS can protect communications from malicious eavesdropping and tampering. Authenticity protections provide assurance that users are actually communicating with the systems as intended. For example, are you sending your
Often cryptographic algorithms and protocols are necessary to keep a system secure, particularly when communicating through an untrusted network such as the Internet. Where possible, use cryptographic techniques to authenticate information and keep the information private (but don't assume that simple encryption
SUMMARY. This project will focus on research in cryptology at an advanced international level. Project topics will be analysis and construction of symmetric and asymmetric cryptographic algorithms and protocols. In particular we will use our knowledge involving deep techniques from coding theory on cryptological.
What is a cryptographic protocol?
A cryptographic protocol is a protocol executed by several distant agents through a network where the messages or part of the messages are produced using cryptographic functions (encryption, hashing, etc.). Cryptographic protocols are used for various purpose between the agents:.
May 7, 2006 - This is regarded as offensive because of the malicious payload normally embedded in the virus, and because of the use of anti-anti-virus techniques For instance, on networks some layer 2 protocols are based on crypto (WEP, WPA/TKIP, and others), as are some upper layer protocols (IPSec, SSH, SSL,
primitives such as commutative encryption. We give a list of some relevant al- gebraic properties of cryptographic operators, and for each of them, we provide examples of protocols or attacks using these properties. We also give an overview of the existing methods in formal approaches for analyzing cryptographic proto-.
Using cryptographic techniques, it may be possible to allow intermediate results in a distributed algorithm to be certified independently of who provides them, reducing themes of complexity theory, e.g., interactive provability, average vs. worst-case complexity, and the inherent communication costs of multiparty protocols.
Web is an electronic protocol which allows people to communicate mail, information, and commerce through a digital medium. This new method of information exchange has caused a tremendous need for information security. A thorough understanding of cryptography and encryption will help people develop better ways to
etc. The analysis techniques discussed in this survey assume per- fect cryptography.
This means that cryptographic primitives are considered as black boxes satisfying certain properties, as described in section 2.1. below. This assumption by it- self does not ensure security of the protocols. Even if all cryptographic primitives
The Cryptographic Protocol what are the techniques of cryptography
types of cryptographic algorithms
cryptography methods
types of cryptography
cryptography examples
cryptography algorithms
applications of cryptography
cryptography basics
cryptography computer science
#TheCryptographicProtocolwhatarethetechniquesofcryptography
#typesofcryptographicalgorithms
#cryptographymethods
#typesofcryptography
#cryptographyexamples
#cryptographyalgorithms
#applicationsofcryptography
#cryptographybasics
#cryptographycomputerscience
Visit our YouTube channel for more videos on Bitcoin and Cryptocurrency
https://www.youtube.com/channel/UCTxqXgVxEGQUIFY_MdRz5ww
Also watch:
https://www.youtube.com/watch?v=kH6u_CsQddE
https://www.youtube.com/watch?v=W4LlCYVP65A
This presentation contains images that were used under a Creative Commons License. Click here to see the full list of images and attributions:
https://app.contentsamurai.com/cc/107949

This video covers the background for the Discrete Log Problem in the group Zn*, where Zn* is a cyclic group. The group Zn* are characterized in cyclic and non-cyclic depending on the natural "n."
A test on how to obtain the generators of Zn* is described in this video.

Ever wondered how I consume research so fast? I'm going to describe the process i use to read lots of machine learning research papers fast and efficiently. It's basically a 3-pass approach, i'll go over the details and show you the extra resources I use to learn these advanced topics. You don't have to be a PhD, anyone can read research papers. It just takes practice and patience.
Please Subscribe! And like. And comment. That's what keeps me going.
Want more education? Connect with me here:
Twitter: https://twitter.com/sirajraval
Facebook: https://www.facebook.com/sirajology
instagram: https://www.instagram.com/sirajraval
More learning resources:
http://www.arxiv-sanity.com/
https://www.reddit.com/r/MachineLearning/
https://www.elsevier.com/connect/infographic-how-to-read-a-scientific-paper
https://www.quora.com/How-do-I-start-reading-research-papers-on-Machine-Learning
https://www.reddit.com/r/MachineLearning/comments/6rj9r4/d_how_do_you_read_mathheavy_machine_learning/
https://machinelearningmastery.com/how-to-research-a-machine-learning-algorithm/
http://www.sciencemag.org/careers/2016/03/how-seriously-read-scientific-paper
Join us in the Wizards Slack channel:
http://wizards.herokuapp.com/
And please support me on Patreon:
https://www.patreon.com/user?u=3191693
Signup for my newsletter for exciting updates in the field of AI:
https://goo.gl/FZzJ5w
Hit the Join button above to sign up to become a member of my channel for access to exclusive content!

VISUALIZING MATH 1 (PDF Book Link)
https://gumroad.com/l/visualizingmaths-e-book
Blog Link
https://visualzingmathsandphysics.blogspot.in
1] How sin( ) is a measure of how much perpendicular two objects/forces are.
2] How cos( ) is a measure of how much parallel two objects/forces are.
3] How in complex numbers
i = rotation by 90 degrees
i^2= rotation by 180 degrees
i^3= rotation by 270 degrees.
i^4 = rotation by 360 degrees.
4] Transpose of a matrix = Rotation by 180 degrees around the diagonal.
MATRICES AND ITS APPLICATIONS INTUITIVELY AND SIMPLY EXPLAINED.
5] e^i(angle) = rotation by that angle.
6] sin(30) = 1/2
because at 30 degree the effect of a force reduces to half over the other force/object (as against when the two forces/object are against at 90 degrees w.r.t each other)
7) A X B = |A| |B| sin(angle between A and B).
VISUALIZING MATH 2 PDF BOOK LINK
https://gumroad.com/l/visualizingmath2book
Visualizing Math 2 deals with concepts like
1) How Fourier Transforms are the side-view of a wave.
2) Laplace Transforms are side-view + front view (Imaginary + real part)
3) How Z Transforms are nothing but the discrete cousin of Laplace and DFT of Fourier.
4) How the number 1 appears actually as a fraction 1/1 in Math which means full of full.
Thus sin(90) = 1/1 = full on influence at 90 deg
Thus Max probability = 1/1 = full of full sample space
Thus cos(0) = 1/1 = full on full influence at 0 deg (when parallel)
Unit Circle radius = 1/1 = magnitude doesn't decrease/increase
throughout the rotation. Else it would have been a ratio like 2/1 or 1/4 etc.
5) How Continous functions can be visualized as those functions which you can draw on a paper without lifting up the pencil.
6) How a function differentiable at a point means if you stand at that point,...
(1) You will experience a slope. Slope will exist.
(2) This slope however will not be infinite. (fully vertical)
(3) The slope will be either towards the left or the right but not both the directions.
(4) The slope will not wriggle like a snake (oscillate ) at that point.
7) How a hermitian matrix can be visualized as a any object which which exhitibits vertical symmetry. So even if it is rotated upside down about the central axis( diagonal of the matrix) you wont be able to tell the difference.
8) How probability can be visualized much more intuitively by multiplying it by 100 and thus converting it into a percentage.
Eg:- a probability of 0.2 can be converted to 0.2 x 100 = 20%
9) How probability density can be understood using an example of the Probability of finding a man after entering New-york v/s finding a man after entering a sparsely populated desert.
And so on.........
The book is still in works and subsequent updated will be sent to your mail id for free.
Binnoy
http://visualizingmathsandphysics.blogspot.in

In this session, we have discussed MATHEMATICS AS CAREER.
If we see our daily day to day lifestyle it works on Mathematics. A simple example is the Time, we keep boundaries to do a particular work in a particular time period and we have to start a new work and end that in some period of time, all this is called calculating the time and adjusting the work for our need to manage things but if we see technically it is related to mathematics which is called the Time Management.
In Education, The candidates should complete their 10+2 or its equivalent exam in science stream with Mathematics as one of the subjects.
B.Sc. , M.Sc. , B.Tech, BS- 4 YEARS, M. Tech, M.Phil. and Ph.D. are some of the degrees you can complete.
B.Sc. Mathematics Colleges:
1. Indira Gandhi National Open University, Delhi
2. Maharshi Dayanand University, Rohtak
3. Adarsh Mahavidyalaya, Osmanabad
4. Loyola College, Chennai Tamilnadu.
5. St.Xavier’s college Mumbai Maharashtra
6. Christ University Bangalore Karnataka
7. Madras Christian college Chennai Tamilnadu
Master of Philosophy or M.Phil in Mathematics is an advanced postgraduate research degree which offers students with a stretch to research on particular fields of the chosen subject.
Duration, of course, is 2 years
Some of the M.Phil colleges
University of Delhi, Banaras Hindu University, Jawaharlal Nehru University, University of Calcutta, Dr. BR Ambedkar University
The best way to get a good college for Ph.D. is to sit in CSIR-NET and UGC-NET exams for some of the college's GATE is also used as a prerequisite. For Ex. ISI Kolkata uses GATE score for admission in its Ph.D. Maths program conducted for Ph.D. Scholarships.
ENTERPRENEURIAL OPPORTUNITIES are
PRIVATE FINANCIAL CONSULTANT.
COMPUTING & ICT FIRMS.
EDUCATIONAL INSTITUTIONS.
EQUITY RESEARCH FIRMS.
QUANTUM CRYPTOGRAPHY COMPANIES.
2. Mathematics helps in the progression of technological innovation in day to day life. Learning mathematics helps in perception development of individuals in their daily life which help to achieve their goal in life, which include the term like addition, subtraction, multiplication, and division.
The disadvantage of mathematics can be overridden by the easy way of learning or a better approach of teaching to the students in their basics.

How do computer hackers figure out our passwords? Learn about the techniques they use to crack the codes, and what systems protect us.
Building Digital Labyrinths To Hide Your Password - https://youtu.be/KFPkmhcSlo4
Sign Up For The Seeker Newsletter Here - http://bit.ly/1UO1PxI
Read More:
Here's How to Stop Russian Cyber-Hacking
http://www.seeker.com/heres-how-to-stop-russian-cyber-hacking-2149775375.html
“In October, malware embedded in residential internet routers and DVRs helped orchestrate a large-scale distributed denial of service (DDOS) attack on the East Coast that shut down Amazon, Netflix, Twitter and other major websites. The following month, a ransomware hack shut down San Francisco's public transit ticketing system for a few days after Thanksgiving.”
7 sneak attacks used by today's most devious hackers
http://www.infoworld.com/article/2610239/malware/7-sneak-attacks-used-by-today-s-most-devious-hackers.html
“Millions of pieces of malware and thousands of malicious hacker gangs roam today's online world preying on easy dupes. Reusing the same tactics that have worked for years, if not decades, they do nothing new or interesting in exploiting our laziness, lapses in judgment, or plain idiocy.”
How Your Passwords Are Stored on the Internet (and When Your Password Strength Doesn't Matter)
http://lifehacker.com/5919918/how-your-passwords-are-stored-on-the-internet-and-when-your-password-strength-doesnt-matter
“There are a number of ways a site can store your password, and some are considerably more secure than others. Here’s a quick rundown of the most popular methods, and what they mean for the security of your data.”
____________________
DNews is dedicated to satisfying your curiosity and to bringing you mind-bending stories & perspectives you won't find anywhere else! New videos daily.
Watch More DNews on Seeker http://www.seeker.com/show/dnews/
Subscribe now! http://www.youtube.com/subscription_center?add_user=dnewschannel
Seeker on Twitter http://twitter.com/seeker
Trace Dominguez on Twitter https://twitter.com/tracedominguez
DNews on Facebook https://facebook.com/DiscoveryNews
DNews on Google+ https://plus.google.com/u/0/+dnews
Seeker http://www.seeker.com/
Sign Up For The Seeker Newsletter Here: http://bit.ly/1UO1PxI

This is the introductory video for our upcoming video series that would prove to the viewers that arithmetic is not merely a section in competitive exams but is actually an important factor in everyone's daily routine now a days.
With these videos the viewers can understand the essence and real application of arithmetic in one's life starting from small to big situations that happen everyday.

Anastasia from Publica keeps exploring how blockchain and cryptocurrency technologies keep coming closer to becoming a part of our daily lives.
1. A new crypto-collectibles token launched in partnership with the Major League Baseball Players Association. It’s called the Player Token.
Player Tokens are the next step in the collectible experience. They combine traditional baseball trading cards with digital assets.
These digital assets They come in different ‘packs’ just like traditional trading cards. Each has a unique ID that can be traced on the blockchain.
This opens up fun new aspects of the experience because you can see details like the minting date and previous ownership.
Packs will feature tokens representing seventy-three all-star players from all thirty major league teams. Each will be minted in a fixed number of tokens distributed randomly among the packs.
2. West Virginia is rolling out a mobile app so American military workers may cast their votes for upcoming elections. With help from trusted blockchain technology.
They call their app Voatz. And they’ve been testing a pilot project for some time.
The office of State Secretary Mac Warner says, and I quote, four audits of various components of the tool, including its cloud and blockchain infrastructure, revealed no problems.
Their app is intended primarily for military personnel stationed overseas. Although the Voatz project isn't meant to replace traditional voting ballots, it still makes a nice statement about the power of blockchain and its adoption in well-known places.
Blockchains are known for immutability, so voting is an obvious place to look for the benefits of blockchain technology.
Sports and politics are showing up among the busiest blockchain and cryptocurrency adopters.
3. For you video game fans. I’m talking about the hugely popular game called ‘No Man's Sky.’
In this action survival game, two planets are hiding 0.004 BTC with a promise of more hidden Bitcoins to come.
Jon Creasy - a crypto aficionado hopes this cryptocurrency element will inspire more gaming and crypto fans to follow his example.
Jon believes gamers can bring cryptocurrency far along towards mass adoption.
---
What is Publica?
Publica is the first digital publishing platform to use blockchain technology to innovate how books are funded, distributed, bought, and read.
Furthermore, it introduces the publishing world to token economy and provides alternatives to traditional digital self publishing services like Amazon Kindle Publishing and CreateSpace.
The Publica platform provides a real-world blockchain use case and brings publishing to the next level.
---
Find out more about Publica in the links below!
Website: https://publica.com
Publica web-shop: https://shop.publica.com/#/catalog
Publica's eReader app for Android on Google Play: http://bit.ly/Publica-Ereader-App
Publica's eReader app for iOS on the App Store: http://bit.ly/PublicaEreaderApp
Official Telegram Announcement Channel: https://t.me/publicaio
Telegram group: https://t.me/publicaofficial
Twitter: https://twitter.com/Publica
Facebook: https://www.facebook.com/OfficialPublica
Medium: https://medium.com/publicaio
Reddit: https://www.reddit.com/r/publicaio/
Discord: https://discord.gg/XyUYVd

UNDERSTAND SIMPLY.....
1] How sin( ) is a measure of how much perpendicular two objects/forces are.
2] How cos( ) is a measure of how much parallel two objects/forces are.
3] How in complex numbers
i = rotation by 90 degrees
i^2= rotation by 180 degrees
i^3= rotation by 270 degrees.
i^4 = rotation by 360 degrees.
PURPOSE AND APPLICATION OF COMPLEX NUMBERS IN REAL DAILY LIFE MENTIONED FOR GODSAKE!.
4] Transpose of a matrix = Rotation by 180 degrees around the diagonal.
5] e^i(angle) = rotation by that angle.
6] sin(30) = 1/2
because at 30 degree the effect of a force reduces to half over the other force/object (as against when the two forces/object are against at 90 degrees w.r.t each other)
7) A X B = |A| |B| sin(angle between A and B).
PDF Book Link
https://gumroad.com/l/visualizingmaths-e-book
Blog Link
https://visualzingmathsandphysics.blogspot.in
VISUALIZING MATH 2 (WORD & PDF BOOK)
PDF LINK FOR VISUALIZING MATH 2
https://gumroad.com/l/visualizingmath2book
Visualizing Math 2 deals with concepts like
1) How Fourier Transforms are the side-view of a wave.
2) Laplace Transforms are side-view + front view (Imaginary + real part)
3) How Z Transforms are nothing but the discrete cousin of Laplace and DFT of Fourier.
4) How the number 1 appears actually as a fraction 1/1 in Math which means full of full.
Thus sin(90) = 1/1 = full on influence at 90 deg
Thus Max probability = 1/1 = full of full sample space
Thus cos(0) = 1/1 = full on full influence at 0 deg (when parallel)
Unit Circle radius = 1/1 = magnitude doesn't decrease/increase
throughout the rotation. Else it would have been a ratio like 2/1 or 1/4 etc.
5) How Continous functions can be visualized as those functions which you can draw on a paper without lifting up the pencil.
6) How a function differentiable at a point means if you stand at that point,...
(1) You will experience a slope. Slope will exist.
(2) This slope however will not be infinite. (fully vertical)
(3) The slope will be either towards the left or the right but not both the directions.
(4) The slope will not wriggle like a snake (oscillate ) at that point.
7) How a hermitian matrix can be visualized as a any object which which exhitibits vertical symmetry. So even if it is rotated upside down about the central axis( diagonal of the matrix) you wont be able to tell the difference.
8) How probability can be visualized much more intuitively by multiplying it by 100 and thus converting it into a percentage.
Eg:- a probability of 0.2 can be converted to 0.2 x 100 = 20%
9) How probability density can be understood using an example of the Probability of finding a man after entering New-york v/s finding a man after entering a sparsely populated desert.
And so on.........
The book is still in works and subsequent updated will be sent to your mail id for free.
Binnoy
visualizingmathsandphysics.blogspot.in
A SEQUEL TO VISUALIZING MATH 1
The Book Visualizing Math 2 in word and pdf format is a sequel to Visualizing Math which is once again available on gumroad the link as
Visualizing Math 1 Link
https://gumroad.com/l/visualizingmaths-e-book

Cryptography Challenge
TEJ2O0-A Castlebrooke Secondary School
Peel District School Board
2013-10-11
Marut Patel, Russell Islam, Stephen Daley, Yusuf Abdirizak
For the example of how to use the symbolism encryption, we never used our own example because it has flaws. We used a different method to show how this can actually be really secure.

Aarthi Sundaram, a PhD student in computer science at the Centre for Quantum Technologies, takes a quick look at the history of code-making and code-breaking - right up to the impact of quantum physics for both sides.

What is the mathematical secret behind the barcodes we find on our books? How does it self-check for mistakes?
In this extract from his lecture on 'Codebreaking in Everyday Life', John D. Barrow, Gresham Professor of Geometry and Professor of Mathematical Science at the University of Cambridge, explains the maths behind this piece of code we find in our everyday lives.
This is the 11th part of 'Codebreaking in Everday Life'.
The full lecture is available (in 13 parts) here on YouTube, or it can be downloaded (like all of our lectures) in its complete form from the Gresham College website, in video, audio or text formats:
http://www.gresham.ac.uk
Gresham College has been giving free public lectures since 1597. This tradition continues today with all of our five or so public lectures a week being made available for free download from our website.

Most working engineers view machine-checked mathematical proofs as an academic curiosity, if they have ever heard of the concept at all. In contrast, activities like testing, debugging, and code review are accepted as essential. They are woven into the lives of nearly all developers. In this talk, I will explain how I see machine-checked proofs enabling new everyday activities for developers of computer software and hardware. These activities have the potential to lower development effort dramatically, at the same time as they increase our assurance that systems behave correctly and securely. I will give a cosmological overview of this field, answering the FAQs that seem to stand in the way of practicality; and I will illustrate the principles with examples from projects that you can clone from GitHub today, covering the computing stack from digital hardware design to cryptographic software and applications.
Today's developers of computer software and hardware are tremendously effective, compared to their predecessors. We have found very effective ways of modularizing and validating our work. The talk is about ammunition for these activities from a perhaps-unexpected source.
Modularity involves breaking a complex system into a hierarchy of simpler pieces, which may be written and understood separately. Structured programming (e.g., using loops and conditionals instead of gotos) helps us read and understand parts of a single function in isolation, and data abstraction lets us encapsulate important functionality in objects, with guarantees that other code can only access the private data by calling public methods. That way, we can convince ourselves that the encapsulated code upholds certain essential properties, regardless of which other code it is linked with. Systematic unit testing also helps enforce contracts for units of modularity. Each of these techniques can be rerun automatically, to catch regressions in evolving systems, and catch those regressions in a way that accurately points the finger of responsibility to particular modules.
Validation is an important part of development that encompasses testing, debugging, code review, and anything else that we do to raise our confidence that the system behaves as intended. Experienced engineers know that validation tends to take up the majority of engineering effort. Often that effort involves mentally taxing activities that would not otherwise come up in coding. One example is thinking about test-case coverage, and another is including instrumentation that produces traces to consult during debugging.
It is not hard for working developers to imagine great productivity gains from better ways to break systems into pieces or raise our confidence in those pieces. The claim I will make in this talk is that a key source of such insights has been neglected: machine-checked mathematical proofs. Here the basic functionality is an ASCII language for defining mathematical objects, stating theorems about them, and giving proofs of theorems. Crucially, an algorithm checks that purported proofs really do establish the theorems. By going about these activities in the style of programming, we inherit usual supporting tools like IDEs, version control, continuous integration, and automated build processes. But how could so esoteric a task as math proofs call for that kind of tooling, and what does it have to do with building real computer systems?
I will explain a shared vision to that end, developed along with many other members of my research community. Let me try to convince you that all of the following goals are attainable in the next 10 years.
We will have complete computer systems implementing moderately complex network servers for popular protocols, proved to implement those protocols correctly, from the level of digital circuits on up. We will remove all deployed code (hardware or software) from the trusted computing base, shifting our trust to much smaller specifications and proof checkers.
Hobbyists will be able to design new embedded computing platforms by mixing and matching open-source hardware and software components, also mixing and matching the proofs of these components, guaranteeing no bugs at the digital-abstraction level or higher, with no need for debugging.
New styles of library design will be enabled by the chance to attach a formal behavioral specification to each library. For instance, rank-and-file programmers will able to assemble their own code for cryptographic protocols, with code that looks like reference implementations in Python, but getting performance comparable to what experts handcraft in assembly today. Yet that benefit would come with no need to trust that library authors have avoided bugs or intentional backdoors, perhaps even including automatic proofs of cryptographic security properties.
Adam Chlipala
https://fahrplan.events.ccc.de/congress/2017/Fahrplan/events/9105.html